Trinity Industries, Inc. FEI Presentation May 31, 2012.

Slides:



Advertisements
Similar presentations
Mark Carey, CPA, CISA President Toll free: x101 International: x101 Enterprise Risk Management:
Advertisements

“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Introduction to Enterprise Risk Management (ERM)
Executive Insight through Enhanced Enterprise Risk Management Leverage Value From Your Risk Management Investment.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Building a Better Business Model Start with a discussion of Risk Higher Education Policy Commission Board of Governors Summit August 2, 2014.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Operational risk management Margaret Guerquin, FSA, FCIA Canadian Institute of Actuaries 2006 General Meeting Chicago Confidential © 2006 Swiss Re All.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
Enterprise Risk Management EXECUTIVE POLICY GROUP Enterprise Risk Managementwww.utdallas.edu Enterprise Risk Management Campus Safety.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Presented by: G. Lawrence Buhl, CPA Retired Audit Partner at Ernst & Young 1 Risk Management & ERM: What Insurer Boards Need to Know.
Corporate Ethics Compliance *
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
PAINTING THE FULL PICTURE
Vendor Risk: Effective Management is Essential
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Chapter 15 Conflicts of Interest in the Financial Industry.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
1 Enterprise Risk Management (ERM) Program PNM Resources, Inc. March 29, 2007 Presentation to American Public Power Association March 2007 Austin, Texas.
Enterprise Risk Management (ERM) ABN AMRO Business Unit North America (BU NA) Overview for ERM Committee April 11, 2007.
Risk Management (“RM”) Program January Risk Management Objectives  Goal of the Halliburton RMProgram is to achieve: - Higher returns on capital.
Lecture 03. Overview of Lecture 02 Theory of Comparative Advantage International Business Methods Business Strategies Business Stakeholders Organizational.
©2010 FLAT WORLD KNOWLEDGE, INC. 1 Ethics Companies are being held to a higher standard Customers will punish unethical behavior Sustain- ability Consumers.
Stepped Up ERM Teresa McKay Director, Defense Finance and Accounting Service ASMC Washington Chapter September 17, 2008.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.
H UMAN R ESOURCES M ANAGEMENT Beki Webster Director, HR, Intelligence Systems Division Northrop Grumman Information Systems July 31, 2009.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
© 2003 DelCreo, Inc. All rights reserved. | U.S. Toll-free 866.DELCREO | International 001/ |
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Manager ethics Responsible Management and the Responsible Business Enterprise Slovak University of Technology Faculty of Material Science and Technology.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
New A.M. Best Cyber Questionnaire
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Albany Bank Corporation Security Incident Management Program.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Risk Management Bill Ferguson, Ray Farmer, Tim Morris, Marty Wingate Insurance Summit
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
3 R’s of Sustainability SESSION 1: The What, Why and How of Sustainability PREVIEW ONLY.
Macroprudential Surveillance and the NAIC Commissioner Adam Hamm.
I NSURANCE IN THE CONTEXT OF PRINCIPLES FOR SUSTAINABLE INSURANCE (PSI) OF THE UN ENVIRONMENT PROGRAM FINANCIAL INITIATIVE, AND CLIMATE CHANGE EFFECTS.
Quantifying Cyber Security Risk in Dollars and Cents to Optimize Budgets CRM008 Speakers: Chris Cooper, VP, Operational Risk Officer; RGA Reinsurance Company.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Board Role In Recognizing, Identifying and Mitigating Risk Constance B
Agenda 1) ERM Principles and Practice by Mike Mahaffey (45 minutes)
Cybersecurity as a Business Differentiator
New A.M. Best Cyber Questionnaire
CPA Gilberto Rivera, VP Compliance and Operational Risk
ENTERPRISE RISK MANAGEMENT IN THE CASE OF THE FINANCIAL SERVICE SECTOR
How can an Enterprise Risk Management (ERM), programme enable organizations achieve strategic objectives more effectively? Dr P S Sahota  
Presentation to the Portfolio Committee on Finance
Cybersecurity Policies & Procedures ICA
Information Security: Risk Management or Business Enablement?
I have many checklists: how do I get started with cyber security?
Kuveyt Turk Participation Bank
Cyber Risk & Cyber Insurance - Overview
Cyber security Policy development and implementation
Prepared by: Yazan Metwalli(148371) Moyad Habiballah(137535)
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE
GRC - A Strategic Approach
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
KEY INITIATIVE Finance Function Management
Presentation transcript:

Trinity Industries, Inc. FEI Presentation May 31, 2012

Trinity’s Enterprise Risk Management (ERM) Evolution ERM Reputation Crisis OSHA EPA SEC Sarbanes/Oxley Contracts IRS Carbon Footprint Community Impact Employee Relations Business Continuity Access to Capital Maintaining Market Leadership Position Litigation Exposure Insurance Coverage Product Quality Sustainability Corporate Compliance Enterprise Risk Management (ERM) Process Intra-Relationship Diagram 2

3 ERM Documentation Framework Consolidated ERM Top Risk Chart Consolidated ERM Dashboard ERM Detail Risk Database Sustainability Scorecard Sustainability Database Corporate Compliance Scorecard Department Specific Data Repository for Legal and Regulatory Compliance Corporate Compliance Database Department Specific Data Repository for Sustainability Performance Plant Specific Data Repository for Legal and Regulatory Compliance Plant Specific Data Repository for Sustainability Performance One Process Not Three Data Above Red Line is Facilitated/ Managed by Internal Audit All risks, risk ratings, mitigation strategies, and supporting compliance and/or sustainability data are owned by the respective owners. Data Below Red Line is Facilitated/ Managed by Departments/Plants

Emerging IT Risks - Cybersecurity Trinity’s Defense - Access Control Layers “Cyber risk was cited as the second greatest systemic risk facing companies behind economic and financial risk, according to a recent KPMG Audit Committee Roundtable survey.” (ACI’s Spring 2011 Audit Committee Rountable Report, KPMG LLP 2011) Cybersecurity Lifecycle Inspection (e.g., regular assessments of cybersecurity program) Protection (e.g., installation of appropriate mechanisms to prevent attacks) Detection (e.g., appropriate monitoring tools exist to alert of attacks) Reaction and Response (e.g., procedures are in place to respond to attacks) Emerging IT Risk Areas Competitive Risk Threat of competitors gaining an advantage through the use of technology Portfolio Risk Danger that company is spending too much of its IT resources on basic operational expenses rather than transformational investments Execution Risk Failure to execute IT programs effectively, including major IT project implementations and initiatives Service & Security Risk Risk that systems are not available to support and service employees and customers and that critical data is not properly secured IT Risk Webster defines Cybersecurity as - measures taken to protect a computer or computer system against unauthorized access